2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of ...
Internal investigations must uncover the truth about misconduct or fraud without damaging innocent employees. Here are the basics of how to plan and conduct a successful internal investigation.
As an IT professional and working network administrator, you may find yourself called upon to testify as a victim or a witness (i.e., a representative of a company whose network is victimized) in a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results